8/11/2019 Project Report on Net Working (2)
1/39
CHAPTER -1
INTRODUCTION
1.1 COMPANY PROFILE
Labs N Rack , Chandigarh is a deemed software and web development company of India.
We have continuously delivered variety of services such as product engineering, web
development, packaged application services, I consulting, product licensing and
industrial trainings. We have over a decade of e!perience and in depth e!pertise in
diverse technologies to deliver tantali"ing solutions to clients all over the world. #partfrom our strong focus on $uality, we ensure that we e!ecute and deliver the pro%ects
within agreed timelines and cost budgets.
Experience
We have added value to a number of companies, worked around various industry
verticals and have a perfect understanding of domestic and international client needs.
hus, we are able to $uickly grasp the finer nuances and deliver solutions which precisely
address the re$uirements, thus delivering systematically devised solutions which prove to
be highly valuable.
Resources
Working out of multiple development centers and marketing offices across India and
overseas, trained and e!perience professionals who form the &affodil team, serve as the
most important and robust Infrastructural elements for the company. #t the same time,
state'of'the'art e$uipment and access to cutting edge technologies lends us a uni$ue edge
over our competitors. (artnerships with global leaders further allow &affodil to access
resources which remain unmatched in the industry.
)
8/11/2019 Project Report on Net Working (2)
2/39
Expertise
We bring years of competence and e!pertise across a number of leading technologies
such as desktop and web application development, web content management, mobile *
tablet application development, cloud platforms and other allied technologies. his is
combined with our healthy partnerships with leading names such as +icrosoft.
CHAPTER-
8/11/2019 Project Report on Net Working (2)
3/39
PRO!ECT "OR#
.1 NET"OR#IN$Computer networking is the scientific and engineering discipline concerned with
communication between computer systems. -uch networks involve at least two devices
capable of being networked with at least one usually being a computer. he devices can
be separated by a few meters e.g. via /luetooth0 or thousands of kilometers e.g. via the
Interne0. Computer networking is sometimes considered a sub'discipline of
telecommunication. Networking is an interconnection of computers and peripheral
devices with carriers and data communication devices for the purpose of e!changing datainformation and saving the resources. Computers in the network may be connected within
a building, city, nation or world wide.
.1.1 LAN-1
L#N stands for Local #rea Network. hese types of networks are established within a
building or campus
cover a distance of less than )2 km. It was developed in )342. It5s a high speed n6w.
.1.MAN-%
+#N stands for +etropolitan #rea Network. his network is established within a city in
different buildings i.e. data can be shared by two or more buildings within a city up to a
distance of )72 km. It was developed in )382.
.1.& "AN-%
W#N means Wide #rea Network. In this network computers can be connected within a
country or globally. It is developed in )392. :enerally covers distance of more than )72
km. It can further be classified as :lobal Network or ;nterprise Network.
&epending on the type and si"e networking is classified in three categories1
8/11/2019 Project Report on Net Working (2)
4/39
he original Local #rea Networks L#Ns0 were nothing more than coa!ial cabling,
strung from terminal servers to desktop terminals whose users were treated to
monochromatic te!t displayed on low'resolution cathode ray tubes.
In the mid')382s, wide area networks W#Ns0 were slow and crude. erminal servers
multiple!ed access for do"ens of users to 3.9 =bps circuits. hese circuits connected
users to mainframe'based applications that lay hidden in a remote data center.
oday, L#Ns have metamorphosed into high'bandwidth, high'performance and C(>'
intensive client applications such as live, interactive voice and video conferencing, e'mail
and some of the more traditional forms of data processing.
W#Ns have e!perienced radical, evolutionary change. oday, 3.9 =bps is deemed
inade$uate for most of the needs of even a single user. ?ust try to give a user a 3.9 =bps
modem for use as anything but a paperweight.
It is important to recogni"e the inputs for all these changes has been, and remains, the
user@s business re$uirements. he competitive environment of most business entities
ensures that any technological innovations that offer competitive advantages''that is,
better, cheaper or faster get accepted. Aor e!ample, the introduction of the mouse
facilitated access to computing by obviating the need for typing skills. -uddenly, almost
everyone could use a computer (ersonal computer, offered countless advantages by
distributing intelligence down to the desktop.
-oftware developers also drove changes by constantly upgrading a di""ying array of
increasingly comple! products that enabled users to actually use the newly distributed
processing power at their fingertips. ogether, these innovations $uickly made hard'wired
connections to terminal servers obsolete.
he first generation of L#Ns. hese networks offered almost obscene amounts of
bandwidth, such as ) or B +b per second +bps0, depending on whose network you
B
8/11/2019 Project Report on Net Working (2)
5/39
purchased. Initially, these L#Ns were used as a more fle!ible means of connecting users
with terminal servers. #fter all, the users@ basic re$uirements hadn@t changed all that
much, and the increased bandwidth was more than ade$uate to support terminal
emulation.
. O'!ECTI(E OF NET"OR#IN$
New networks are popping up daily in developed countries but also in the developing
nations. he ;astern ;uropean countries were technologically starved under -oviet
control, and purchasing advanced technology, taking a si"able leap in the upgrade path. #
global linking is taking place, and thousands more %oin in the benefits of networking
daily.
..1 D)t) *+)rin,1'
-haring data today is easier due to networking and become better than the proliferation of
electronic mail. ;'mail has become one of the leading motivators for companies. #s a
means of sharing important information, ;'mail is among organi"ations from every
industry imaginable. # large number of people have become used to seeing a letter
waiting in their electronic mailbo!es. he letter itself may contain notes about a friendly
after'work game of golf, or last year@s fiscal report. he ability to effortlessly and $uickly
move data from one person to the ne!t is an option too good to pass up for many
organi"ations.
-hared files may e!ist in one location with multiple people accessing them or updating
parts of them. &atabase applications are found in every computeri"ed organi"ation.
Networks offer the capabilities of multi'user access. +ore database applications
incorporate record locking a means by which a person updating a record has e!clusiveuse of the record while others who attempt to access it cannot do so.
Not only data files, but also e!ecutable files may be shared. When a user invokes an
e!ecutable file on a network server, a copy of it is transmitted over the network into the
memory of the local user@s workstation.
7
8/11/2019 Project Report on Net Working (2)
6/39
.. Resource *+)rin,
he benefits of modern networking are the ability to share peripherals. Aew companies
have the resources to place a printer on every user@s desk. Networks offer a logical and
cost'effective solution. -ince, the introduction of several users could cause conflict at the
printer spooling is utili"ed so that print %obs can be arranged in an orderly manner.
NetWare provides such services in the form of print $ueues and print servers.
he ability of sharing printers and disk space has been the driving force behind many
companies installing (C'based networks. -hared modems are typically called modem
servers.
L#N topologies can be described using either a physical or a logical perspective. #
physical topology describes the geometric arrangement of components that comprise the
L#N. It is a theoretical construct that graphically conveys the shape and structure of the
L#N.# logical topology describes the possible connections between pairs of networked
endpoints that can communicate. his is useful in describing which endpoints can
communicate with which other endpoints, and whether those pairs capable of
communicating have a direct physical connection to each other
.& NET"OR#
# Network is a group of two or more computers connected together. his connection is
done physically using a wired or wireless system. hese computers are able to
communicate, e!change information and use software that observes the same set of
protocols. &ifferent types of computers, with different operating systems, can b used.
Networks can also be characteri"ed in terms of their si"e. he si"e is a measurement of
the spatial distance that the network covers.
9
8/11/2019 Project Report on Net Working (2)
7/39
Networks can interconnect with other Networks and contain many levels of subnetworks.
Aig .) /asic Network
.&.1 #e Concept%
# network is a set of hardware devices connected together, either physically or logically
to allow them to e!change information
.
Networks are used for an incredible array of different purposes. In fact, the definitions
above are so simple for the specific reason that networks can be used so broadly, and can
allow such a wide variety of tasks to be accomplished. While most people learning about
networking focus on the interconnection of (Cs and other DtrueE computers, you use
4
8/11/2019 Project Report on Net Working (2)
8/39
various types of networks every day. ;ach time you pick up a phone, use a credit card at a
store, get cash from an #+ machine, or even plug in an electrical appliance, you are
using some type of network.
In fact, the definition can even be e!panded beyond the world of technology altogether1
I@m sure you@ve heard the term DnetworkingE used to describe the process of finding an
employer or employee by talking to friends and associates. In this case too, the idea is
that independent units are connected together to share information and cooperate.
he widespread networking of personal computers is a relatively new phenomenon. Aor
the first decade or so of their e!istence, (Cs were very much Dislands unto themselvesE,
and were rarely connected together. In the early )332s, (C networking began to grow in
popularity as businesses reali"ed the advantages that networking could provide. /y the
late )332s, networking in homes with two or more (Cs started to really take off as well.
his interconnection of small devices represents, in a way, a return to the Dgood old daysE
of mainframe computers. /efore computers were small and personal, they were large and
centrali"ed machines that were shared by many users operating remote terminals. While
having the entire computer power in one place had many disadvantages, one benefit was
that all users were connected because they shared the central computer.
Individuali"ed (Cs took away that advantage, in favor of the benefits of independence.
Networking attempts to move computing into the middle ground, providing (C users
with the best of both worlds1 the independence and fle!ibility of personal computers, and
the connectivity and resource sharing of mainframes. In fact, networking is today
considered so vital that it5s hard to conceive of an organi"ation with two or more
computers that would not want to connect them togetherF
. NET"OR#IN$ 'A*IC*
8
8/11/2019 Project Report on Net Working (2)
9/39
Gere are some of the fundamental parts of a network1
Aig.. Networking /asics
..1 Net/or0
# network is a group of computers connected together in a way that allows information to
be e!changed between the computers.
.. No2e
# node is anything that is connected to the network. While a node is typically a
computer, it can also be something like a printer or C&'RH+ tower.
..& *e,3ent
# segment is any portion of a network that is separated, by a switch, bridge or router,
from other parts of the network.
.. ')c04one
3
8/11/2019 Project Report on Net Working (2)
10/39
he backbone is the main cabling of a network that all of the segments connect to.
ypically, the backbone is capable of carrying more information than the individual
segments. Aor e!ample, each segment may have a transfer rate of )2 +bps megabits per
second0, while the backbone may operate at )22 +bps.
..5 Topo6o,
opology is the way that each node is physically connected to the network more on this
in the ne!t section0.
..7 Loc)6 Are) Net/or0 8LAN9
# L#N is a network of computers that are in the same general physical location, usually
within a building or a campus. If the computers are far apart such as across town or in
different cities0, then a Wide #rea Network W#N0 is typically used.
..: Net/or0 inter;)ce c)r2 8NIC9
;very computer and most other devices0 is connected to a network through an NIC. In
most desktop computers, this is an ;thernet card normally )2 or )22 +bps0that is
plugged into the slot on the computer5s motherboard.
..< Me2i) Access Contro6 8MAC9 )22ress
his is the physical address of any device '' such as the NIC in a computer '' on the
network. he +#C address, which is made up of two e$ual parts, is 9 bytes long. he
first < bytes identify the company that made the NIC. he second < bytes are the serial
number of the NIC itself.
..= Unic)st
# unicast is a transmission from one node addressed specifically to another node.
..1> Mu6tic)st
)2
8/11/2019 Project Report on Net Working (2)
11/39
In a multicast, a node sends a packet addressed to a special group address. &evices that
are interested in this group register to receive packets addressed to the group. #n e!ample
might be a Cisco router sending out an update to all of the other Cisco routers.
..11 'ro)2c)st
In a broadcast, a node sends out a packet that is intended for transmission to all other
nodes on the network.
.5 FACTOR*%
). he type of data transmission technology used is C(6I(Network0.
. It carries voice, data or both kinds of signals.
8/11/2019 Project Report on Net Working (2)
12/39
Aig .
8/11/2019 Project Report on Net Working (2)
13/39
Aig..B he basic +#N network
.7.&. "i2e Are) Net/or0% -
Wide #rea Networks W#N0 connect geographic areas, such as Alorida, the >nited
-tates, or the world. -atellite uplinks may be used to connect this type of network.
)
8/11/2019 Project Report on Net Working (2)
14/39
Aig .7 he basic W#N network
>sing a W#N, schools in Alorida can communicate with place like okyo in a matter of
minutes. It uses multipliers to connect local and metropolitan networks to global
communications networks like the Internet. # W#N will not appear to be much different
than a L#N or a +#N.
Range No area specified
opology +i!
Cable Aibber optics6Wireless
-peed
8/11/2019 Project Report on Net Working (2)
15/39
.:AD(ANTA$E* OF IN*TALLIN$ A *CHOOL
NET"OR#
.:.1*pee2% -Networks provide a rapid method for sharing and transferring files.
Without a network, copying them to floppy disks, then carrying or sending the disks from
one computer to another shares file. his method of transferring files is very time'
consuming.
.:. Cost% - Network provides many popular software programs are available at
considerable savings when compared to buying individually licensed copies. /esides
monetary savings, sharing a program on a network allows for easier upgrading of the
program. he changes have to be done only once, on the file server, instead of on all the
individual workstations.
.:.& *ecurit% -Ailes and programs on a network can be designated as Jcopy inhibit,J
so that no illegal copying of program take place. (asswords can be used for specific
directories to restrict access to authori"ed users.
.:. Centr)6i?e2 *o;t/)re M)n),e3ent% -he benefits of installing a networkat a school are the fact that all of the software can be loaded on one computer. his
eliminates the need to spend time and energy installing updates and tracking files on
independent computers throughout the building.
.:.5 Resource *+)rin,% --haring resources is another area in which a network
e!ceeds stand'alone computers. If peripherals are added to a network, many users can
share them.
.:.7 E6ectronic M)i6% -he network provides the hardware necessary to install an e'
mail system. ;'mail aids in personal and professional communication and it facilitates the
dissemination of general information to the entire network. ;'mail on a L#N can enable
)7
8/11/2019 Project Report on Net Working (2)
16/39
students to communicate with teachers and peers at there own school. If the L#N is
connected to the Internet, students can communicate with others throughout the world.
.:.: F6exi46e Access% - -chool networks allow students to access their files from
computers throughout the school. -tudents can begin an assignment in their classroom,
save it on a public access area of the network, and then go to the media center after
school to finish their work.
.:.< "or0,roup Co3putin,% -Workgroup software allows many users to work
on a document or pro%ect concurrently. Aor e!ample, educators located at various schools
within a country could contribute their ideas about new curriculum standards to the same
document and spreadsheets.
.< HARD"ARE U*ED IN NET"OR#IN$
.
8/11/2019 Project Report on Net Working (2)
17/39
.
8/11/2019 Project Report on Net Working (2)
18/39
Aigure .9 hub
.
8/11/2019 Project Report on Net Working (2)
19/39
8/11/2019 Project Report on Net Working (2)
20/39
provide interconnectivity between like and unlike media RAC )8)0. hey use
preconfigured static routes, status of their hardware interfaces, and routing protocols to
select the best route between any two subnets. # router is connected to at least two
networks, commonly two L#Ns or W#Ns or a L#N and its I-(@s network. -ome &-L
and cable modems, for home and even office0 use, have been integrated with routers to
allow multiple home6office computers to access the Internet through the same connection.
Routers to allow for I;;; 82.))b6g wireless enabled devices to connect to the network
without the need for cabled connections.
Aig .4 Router
.
8/11/2019 Project Report on Net Working (2)
21/39
Aigure .)) -witch
Fi, .< s/itc+es
.= O*I MODEL
he H-I model is the very heart of networking with every layer performing a specific
task in order to facilitate data communications. In the world of networking the first four
B0 layers are the focus. hey define the following1
What type and speed of L#N and W#N media to be implemented
Gow data is sent across the media
What type of addressing schemes will be usedK
Gow data will be reliably sent across the network and how flow control will be
accomplished
What type of routing protocol will be implemented
)
8/11/2019 Project Report on Net Working (2)
22/39
Why a Layered Network +odelK
Reduces comple!ity
-tandardi"es interfaces
Aacilitates modular engineering
;nsures interoperable technology
#ccelerates evolution
-implifies teaching and learning
he H-I model ' seven numbered layers indicate distinct functions. In the ransmission
Control (rotocol6Internet (rotocol C(6I(0, the distinct functions fit into five named
layers. his separation of networking functions is called 6)erin,.
he Hpen -ystem Interconnection H-I0 reference model describes how information
from a software application in one computer moves through a network medium to a
software application in another computer. he H-I reference model is a conceptual model
composed of seven layers, each specifying network functions. he model was developed
by the International Hrgani"ation for -tandardi"ation I-H0 in )38B, and it is now
considered the primary architectural model. he H-I model divides the tasks involved
with moving information between networked computers into seven smaller, more
manageable task groups. # task or group of tasks is then assigned to each of the seven
H-I layers. ;ach layer is reasonably self'contained so that the tasks assigned to each
layer can be implemented.
Independently, this following list shows the seven layers of the Hpen -ystem
Interconnection H-I0 reference model1
)0Layer )'(hysical
0 Layer ' &ata link
8/11/2019 Project Report on Net Working (2)
23/39
#/L;.) H-I reference model
.=.1 LAYER* OF O*I MODEL
.=.1.1 L)er 1 - P+sic)6
he (hysical layer defines the electrical, mechanical, and all physical hardware means of
sending and receiving data itself. It includes cables, cards, and all physical aspects. It
conveys the bit stream through the network at the electrical and mechanical level. he
physical layer specifications also define characteristics, such as voltage levels, timing of
impulses, physical data rates, ma! transmission distance, and physical connectors.
(hysical layer implementations can be categori"ed as either W#N or L#N specifications.
.=.1. L)er - D)t) Lin0
he data link layer defines the format of data, and provides its reliable transit across the
physical network link. #t this layer, bits are encoded6decoded into data packets with
protocol'specific headers, including checksums, source6destination addressmanagement,
flow control, frame synchroni"ation, and handles any errors in the physical layer. It
8/11/2019 Project Report on Net Working (2)
24/39
contains two sub layers ' +#C +edia #ccess Control0, and LLC Logical Link
Control0.
.=.1.& L)er & Net/or0
he Network layer provides network addressing which differs from the data link layer
+#C address0. It also facilitates switching, routing, error handling, congestion control,
and packet se$uencing. It allows for defining the logical network layout, and virtual
logical paths for transmitting data between network nodes. he Internetwork (rotocol
I(0 operates at this layer. I( defines network addresses in a way that route selection can
be determined systematically by comparing the source network address with the
destination address, and applying the subnet mask.
.=.1. L)erTr)nsport
his layer maintains $uality of communication. #cts, as the traffic cop making sure flow
is orderly. ;nsures message validity and integrity
.=.1.5 L)er 5 *ession
he -ession layer generally deals with session and connection coordination. Itestablishes, manages and terminates communications sessions. -essions consist of service
re$uests and responses that occur between applications in different network devices.
-ession protocol implementations include R(C Remote (rocedure Call0, MI( Mone
Information (rotocol0, #pplealk, -C( -ession Control (rotocol0.
.=.1.7 L)er 7 - Present)tionhe (resentation layer deals with conversion and coding of data from application to
network format. It ensures the application layer data can be readable by other systems@
application layer. his layer formats and encrypts data, providing compatibility between
systems. It is sometimes called the Jsynta! layerJ
B
8/11/2019 Project Report on Net Working (2)
25/39
.=.1.: L)er : - App6ic)tion
he #pplication layer supports and interacts directly with software applications. Its
functions include identifying communication partners, determining resource availability
and synchroni"ing communication. -ome e!amples of application layer implementations
include A( Aile ransfer (rotocol0, elnet, -+( -imple +ail ransfer (rotocol0.
he information e!change process occurs between peer H-I layers. ;ach layer in the
source system adds control information to data, and each layer in the destination system
analy"es and removes the control information from that data.
If -ystem # has data from software application to send to -ystem /, the data is passed to
the application layer. he application layer in -ystem a then communicates any control
information re$uired by the application layer in -ystem / by preparing a header to the
data. he resulting information unit a header and the data0 is passed to the presentation
layer, which prepares its own header containing control information intended for the
presentation layer in -ystem /. he information unit grows in si"e as each layer prepares
its own header and, in some cases, a trailer0 that contains control information to be used
by its peer layer in -ystem /. #t the physical layer, the entire information unit is placed
onto the network medium.
he physical layer in -ystem / receives the information unit and passes it to the data link
layer. he data link layer in -ystem / then reads the control information contained in the
header prepared by the data link layer in -ystem #. he header is then removed, and the
remainder of the information unit is passed to the network layer. ;ach layer performs the
same actions1 he layer reads the header from its peer layer, strips it off, and passes the
remaining information unit to the ne!t highest layer. #fter the application layer performs.
.1> NET"OR# ADDRE** TRAN*LATION
We can communicate with the router accessing the internet with the help of nat. In nat
there is N/R which is called net work border router that is used to translate private
addresses into public addresses. In accessing the internet we have to use public addresses
instead of private addresses. so we have to use N# . N# is of < types1 first is of
7
8/11/2019 Project Report on Net Working (2)
26/39
dynamic nat,second is overload, and third is dynamic overload. -tatic N# is for
converting one private address to one public address, in dynamic N# ,many private ip
addresses are converted into many public addresses.
.11 REBUIREMENT* FOR NET"OR#IN$
he re$uirement components are divided into two basic categories1 '
). -oftware component.
. Gardware component.
.1 INTRODUCTION TO TCPIP%
C( and I( were developed by a &epartment of &efense &H&0 research pro%ect to
connect a number different networks designed by different vendors into a network of
networks the JInternetJ0. It was initially successful because it delivered a few basic
services that everyone needs file transfer, electronic mail, remote logon0 across a
very large number of client and server systems. -everal computers in a small
department can use C(6I( along with other protocols0 on a single L#N. he I(
component provides routing from the department to the enterprise network, then toregional networks, and finally to the global Internet. Hn the battlefield a
communications network will sustain damage, so the &H& designed C(6I( to be
robust and automatically recover from any node or phone line failure. his design
allows the construction of very large networks with less central management.
Gowever, because of the automatic recovery, network problems can go undiagnosed
and uncorrected for long periods of time.
#s with all other communications protocol, C(6I( is composed of layers1
IP' is responsible for moving packet of data from node to node. I( forwards each
packet based on a four byte destination address the I( number0. he Internet
authorities assign ranges of numbers to different organi"ations. he organi"ations
9
8/11/2019 Project Report on Net Working (2)
27/39
assign groups of their numbers to departments. I( operates on gateway machines
that move data from department to organi"ation to region and then around the
world.
TCP' is responsible for verifying the correct delivery of data from client to
server. &ata can be lost in the intermediate network. C( adds support to detect
errors or lost data and to trigger retransmission until the data is correctly and
completely received.
*oc0ets ' is a name given to the package of subroutines that provide access to
C(6I( on most systems.
.1& ADDRE**E*%
;ach technology has its own convention for transmitting messages between two
machines within the same network. Hn a L#N, messages are sent between machines by
supplying the si! byte uni$ue identifier the J+#CJ address0. In an -N# network, every
machine has Logical >nits with their own network address. &;CN;, #ppletalk, and
Novell I( all have a scheme for assigning numbers to each local network and to each
workstation attached to the network.
Hn top of these local or vendor specific network addresses, C(6I( assigns a uni$ue
number to every workstation in the world. his JI( numberJ is a four byte value that, by
convention, is e!pressed by converting each byte into a decimal number 2 to 770 and
separating the bytes with a period. Aor e!ample, the (C Lube and une server is
)
8/11/2019 Project Report on Net Working (2)
28/39
networks or the central Internet routers managed by the National -cience Aoundation can
only locate these networks by looking each network number up in a table. here are
potentially thousands of Class / networks, and millions of Class C networks, but
computer memory costs are low, so the tables are reasonable. Customers that connect to
the Internet, even customers as large as I/+, do not need to maintain any information on
other networks. hey send all e!ternal data to the regional carrier to which they
subscribe, and the regional carrier maintains the tables and does the appropriate routing.
.1 IP ADDRE**IN$
#n I( #ddress is a
8/11/2019 Project Report on Net Working (2)
29/39
-ub'net mask depends upon the first octet value of I('address and accordingly
describes the Network address and the host address 1
able . Ist octet value
Ist Octet *u4net-3)s0 C6)ss
)')9 77.2.2.2 #
)8')3) 7.77.2.2 /
)3'< 77.77.77.2 C
In host portion of the I( address if all the bits are set to 2 then this is called the
network address * this is used in the routing table.
In the host portion of I( address if all the bits are set to ) then this address is
called Network broadcast address.
If all the bits of the subnet mask are set to ) i.e. 77.7.77.77 then this is called
the D#ll network broadcast address.E
If all the bits of subnet mask are set to 2 then this address is used for Ddefault
routingE.
he address range starting from B'
8/11/2019 Project Report on Net Working (2)
30/39
# 77.2.2.2
/ 77.77.2.2
C 77.77.77.2
.1.. *u4 nettin,
-uper netting is the I( address is split into separate network address and host address
portion according to the subnet mask. Instead breaking down larger networks into several
smaller subnets, you group smaller networks together to make one larger super net. Aor
e!ample )9 class C networks, ranging from 2).99.
8/11/2019 Project Report on Net Working (2)
31/39
he systems access the &N- through a revolver. he revolver gets the hostname and
returns the I( address or gets an I( address and look up a hostname.
.1. MAC ADDRE**
In computer networking, the +edia #ccess Control +#C0 address is every bit as
important as an I( address.
.1.5. "+)t is ) MAC A22ress
he +#C address is a uni$ue value associated with a network adapter. +#C addresses
are also known as hardware addresses or physical addresses. hey uni$uely identify an
adapter on a L#N.+#C addresses are )'digit he!adecimal numbers B8 bits in length0.
/y convention, +#C addresses are usually written in one of the following two formats1
++1++1++1--1 --1 --
++'++'++'--'--'--
he first half of a +#C address contains the I& number of the adapter manufacturer.
hese I&s are regulated by an Internet standards body see sidebar0. he second half of a
+#C address represents the serial number assigned to the adapter by the manufacturer. In
the e!ample,
221#21C31)B1C813
he prefi! 22#2C3 indicates the manufacturer is Intel Corporation.
.1.7. "+ MAC A22resses
Recall that C(6I( and other mainstream networking architectures generally adopt the
H-I model. In this model, network functionality is subdivided into layers. +#C
addresses function at the data link layer layer in the H-I model0. hey allow
computers to uni$uely identify themselves on a network at this relatively low level.
8/11/2019 Project Report on Net Working (2)
32/39
.1.7.1 MAC @s. IP A22ressin,
Whereas +#C addressing works at the data link layer, I( addressing functions at the
network layer layer
8/11/2019 Project Report on Net Working (2)
33/39
# network interface card NIC0 is a computer circuit board or cardthat is installed in a
computer so that it can be connected to a network. (ersonal computers and workstations
on a local area network L#N0 typically contain a network interface card specifically
designed for the L#N transmission technology, such as ;thernetor token ring. Network
interface cards provide a dedicated, full'time connection to a network. +ost home and
portable computers connect to the Internet through as'needed dial'up connection. he
modemprovides the connection interface to the Internet service provider.5 &ata Link,
Layer &evice
8/11/2019 Project Report on Net Working (2)
34/39
.1: *uper nettin,
-uper netting is the I( address is split into separate network address and host address
portion according to the subnet mask. Instead of breaking down larger networks into
several smaller subnets, you group smaller networks together to make one larger supernet.
Aor e!ample )9 class C networks, ranging from 2).99.
8/11/2019 Project Report on Net Working (2)
35/39
.1= HO" TO PREPARE A NET"OR#
#s this point you will connect to your system with other to prepare6construct a
network .Gere two options are given1' #ttach your computer with e!isting network.
Construct a new network or connect two systems.
In both choices first install the network card and detect it by system. #fter this, check the
L#N Card is H= or NH, by using the command utility (ing )4.2.2.). It is a loop back
utility. If it e!ecutes successfully1 it means L#N card is Hk. Now at that point take a >(
8'conductor wire and connect two R?'B7 connectors at both ends using straight cabling
standards.
If you want to attach your system with e!isting network then one connector is attached
with the hub of e!isting network and the other end with the network card of your system
and provide the network service for communication or using resources over a network.
Aor connecting two systems or construct a new network then cross cabling is used to
connect two network cards of two systems with using other devices. If two or more
system is connected using hub then straight cabling is used. #fter connecting the system
using L#N cable, the services are provided by installing various types of protocol and
other components of network.
.1=.1 Pro@i2in, ser@ice ;or Net/or0
#fter connecting the computer with hardware device you must provide the service for
network by installing the various types of protocol. he various steps for installing the
network C(6I( (rotocol, client service for network and client service for +icrosoft
network as given below1'
Arom desktop, right click on the network place icon and select properties.
8/11/2019 Project Report on Net Working (2)
36/39
Right click on local are connection and choose properties in the network place
properties dialog bo!.
In L#N properties dialog bo! click on install button.
-elect network component type like protocol, client, and service etc. one y one to
add into the system to make your system able for any networking.
.1=. Pro@i2in, Net/or0 *ecurit
he name administrator is give to the account with full control over the computer. Oou
can increase the computer security by renaming the administrator account and thencreating an account named administrator without any permission.
When you create new user a security identifies or -I& is automatically created on the
computer user account. he user is a property of the -I&.
CHAPTER-&
RE*ULT
Cisco is the king of routing, switching, and security, the +icrosoft of the internetworking
world. Cisco, not unlike +icrosoft and other vendors that provides certification, has
created a certification process to give administrators a set of skills and to e$uip
prospective employers with a way to measure those skills or match certain criteria.
8/11/2019 Project Report on Net Working (2)
37/39
he Networking program was created to provide a solid introduction not only to the
Cisco Internetwork operating -ystem IH-0, and Cisco hardware, but also to the
internetworking in general, making it helpful to you in areas that are not e!clusively
Cisco5s. #t this point in the certification process, it5s not unrealistic that network
managers'even those without Cisco e$uipment're$uire Cisco certification for their %ob
applicants.
/ecoming a Networking can be the initial step of a successful %ourney towards a new,
highly rewarding and sustainable career.
8/11/2019 Project Report on Net Working (2)
38/39
CHAPTER-
CONCLU*ION
In this we study about the basic networking, the types of networking and in which
particular area we have to use which particular type of networking process for e!ample in
small geographical area we have to use L#N. We also study about the different type of
topologies and the use of I( addressing and the use of &omain Name -ystem in the
network
8/11/2019 Project Report on Net Working (2)
39/39
REFERENCE*
Website1
www.google.com
www.wikipedia.com
en.wikipedia.org6wiki6Computer network
compnetworking.about.com
www.nasa.gov6multimedia6